Zobrazeno 1 - 10
of 81
pro vyhledávání: '"Yongzhuang Wei"'
Publikováno v:
Tongxin xuebao, Vol 44, Pp 171-184 (2023)
A method was proposed to construct a deep learning distinguisher model for large state block ciphers with large-block and long-key in view of the problem of high data complexity, time complexity and storage complexity of large state block cipher dist
Externí odkaz:
https://doaj.org/article/3b143bc2e7514b72ae7415152d62620e
Autor:
Xiaoli Dong, Yongzhuang Wei
Publikováno v:
IET Information Security, Vol 16, Iss 1, Pp 28-40 (2022)
Abstract The first 9‐round meet‐in‐the‐middle (MITM) attack and improved 8‐round impossible differential (ID) attacks on Rijndael‐160 are studied here. For the first 9‐round MITM attack, a new effective attack path is explored by using
Externí odkaz:
https://doaj.org/article/bc4e2634be08440995fbd3232d330bae
Publikováno v:
IET Information Security, Vol 2023 (2023)
Since their introduction in early 2000, CPA (correlation power analysis), as a cryptographic tool, has been widely used in the cryptanalysis of cryptographic algorithms (being applicable to both symmetric key ciphers as well as to public key encrypti
Externí odkaz:
https://doaj.org/article/27db98be683143c1bbc26f80cfa1bdac
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 18 (2022)
Lightweight ciphers are often used as the underlying encryption algorithm in resource-constrained devices. Their cryptographic security is a mandatory goal for ensuring the security of data transmission. Differential cryptanalysis is one of the most
Externí odkaz:
https://doaj.org/article/bf35ed7fadf8415aa62ca27a2c307a68
Publikováno v:
Tongxin xuebao, Vol 41, Pp 94-101 (2020)
The lightweight block cipher algorithms called GRANULE and MANTRA have a simple structure,fast encryption speed,and they can be easy implemented in software and hardware.Two algorithms are especially suitable for resource-constrained environments.To
Externí odkaz:
https://doaj.org/article/f79c36c57d61470d8169b88db1a83dd8
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2018, Iss 4 (2018)
The nonlinear invariant attack was introduced at ASIACRYPT 2016 by Todo et al.. The attack has received extensive attention of cryptographic community due to its practical application on the full-round block ciphers SCREAM, iSCREAM, and Midori64. How
Externí odkaz:
https://doaj.org/article/b90bec6c3ec042d7b8aa073f877512d9
Publikováno v:
Journal of High Speed Networks. 29:147-157
As a fully homomorphic encryption friendly symmetric-key primitive, DASTA was invented by Hebborn at Fast Software Encryption 2020. A new fixed linear layer design concept is introduced in the DASTA stream cipher so that its AND depth and the number
Publikováno v:
IEEE Systems Journal. 17:1098-1109
Publikováno v:
Cryptography and Communications. 15:487-512
Publikováno v:
Designs, Codes and Cryptography. 90:1289-1318